Users Guide

Table Of Contents
Dell PowerConnect W-Series ArubaOS 6.1 | User Guide Remote Access Points | 185
3. For Default Role, enter the user role you created previously (for example, RemoteAP).
4. Click Apply.
5. In the Profile list, under VPN Authentication Profile, select Server Group.
6. Select the server group from the drop-down menu.
7. Click Apply.
Using CLI
aaa server-group <group>
auth-server <server>
aaa authentication vpn default-rap
default-role <role>
server-group <group>
Configuring Internal Database for Authentication
You can use the controller’s internal database as an authentication server. To configure the internal database for a
remote AP user, do the following:
1. Configure a public IP address for the controller.
2. Configure the VPN server on the controller.
3. Configure the remote AP user role.
4. Configure VPN authentication using the internal database.
5. Add the user to the internal database.
The information in this section assumes you have configured a public IP address for the controller and the VPN
server. For information about configuring the public IP address, see “Configure a Public IP Address for the
Controller” on page181. For information about configuring the VPN server, see “Configure the VPN Server” on
page181.
Using the WebUI
The following procedure illustrates the steps to configure an internal database for a remote AP user. To configure
the user role, you first create a policy that permits the following traffic:
AP control traffic via the Dell PAPI protocol
GRE tunnel traffic
ESP tunnel traffic
Layer-2 Tunneling Protocol (L2TP) traffic
TFTP traffic
FTP traffic
Then, you create a user role that contains this policy.
1. Navigate to the Configuration > Security > Access Control > Policies page.
2. Click Add to create a policy.
3. Enter the Policy Name (for example, rap_policy).
4. From the Policy Type drop-down list, select IPv4 Session.
5. To create the first rule:
NOTE: User roles and policies require the PEFNG and PEFV license. You must install the PEFNG and PEFV license, as described in
Chapter 34, “Software Licenses” .